Headings of the journal
"Educational Resources and Technologies"
All rubrics
Release: 2025-4 (53)
DOI: 10.21777/2500-2112-2025-4-63-73
Keywords: linguistic and cultural interference, grammatical interference, English for academic purposes, intercultural com- munication, academic writing, teaching a foreign language, bilinguals
Annotation: The article examines the problem of the influence of the native language and culture on the acquisition of a foreign language. Attention is focused on the cognitive aspects of interference in the development of academic discourse in English. The causes and conditions of interference are analyzed, including differences in cognitive and communica- tion strategies adopted by native speakers and the studied languages. The main factors influencing the interference process are considered, including differences in language structures, cultural norms, and academic traditions. Linguistic and cultural interference is also considered as a metalinguistic phenomenon that affects the process of mastering English for academic purposes at advanced stages of language learning. Based on the results of the analysis of students’ written works, a detailed classifier of typical interference errors of Russian-English bilinguals in academic discourse is provided. A comprehensive methodological system for overcoming linguistic and cultural interference is proposed, integrated into the disciplines of learning English for academic purposes, a written com- munication workshop, grammar, translation, and project activities. The research is valuable for English language teachers, methodologists and specialists in the field of linguistics, linguodidactics and intercultural communication.
METHODOLOGICAL ASPECTS OF INFORMATION MODELING OF SPATIAL OBJECTS USING LASER SCANNING TECHNOLOGY
Release: 2025-3 (52)
DOI: 10.21777/2500-2112-2025-3-63-69
Keywords: information modeling, laser scanning, mobile terrestrial laser scanning, point cloud, information spatial models, monitoring, big data, data processing
Annotation: The article examines laser scanning technologies as a tool for information modeling of spatial objects. The scan results are considered as an information model of a certain type. Three main information models are considered using the example of laser scanning for examining transport routes: a point cloud model, a three-dimensional model of object points, and a digital image as an information model on a plane. Laser scanning is associated with the processing of a large amount of data, which necessitates the processing of spatial objects in parts. It is shown that information collection technologies based on point-by-point information collection lose their con- nections between the parts of the object. The same problem occurs when processing spatial objects in parts. In order to restore connections in object models, a comprehensive technique is proposed for interfacing informa- tion models obtained by laser scanning of an object. The developed approach to the transformation of a large amount of data based on information modeling provides a holistic representation of a spatial object with high accuracy. In order to improve the visual perception of the model, color coding of points based on photography and thematic mapping is proposed. The article presents the stages of information modeling using mobile laser scanning using the example of a specific section of the Bulgarian highway (Troyan – Karnare pass) with high- quality measurements. The results of the study can be useful to specialists in the field of monitoring transport infrastructures, transport construction, geodesy, big data processing, and road safety.
LEVELS AND CRITERIA FOR ASSESSING DIGITAL PERSONALITY TRAITS
Release: 2025-2 (51)
DOI: 10.21777/2500-2112-2025-2-63-70
Keywords: digital qualities, information literacy, information competence, information culture, information worldview
Annotation: The purpose of this study is to create a system of meaningfully different levels of development of digital personality traits in the modern world. The article presents the levels of digital personality traits that are subject to formation and development by means of the pedagogical process. The levels are differentiated and their substantive criteria are substantiated along with the signs corresponding to the levels as specific manifestations. It is shown that each level corresponds to a certain formed cultural and didactic unit that ensures effective human activity in the digital world. A system of criteria for the development of digital information culture and their main features in relation to the disclosed levels is presented in the form of a summary table. It is concluded that information culture at this stage acquires not only systemic, but also conceptual features of an individual’s information worldview, representing his stable life position and identity. The scientific novelty of the article lies in the fact that the criteria for assessing these levels and the main signs of their manifestation are revealed in a meaningful context. As a result, the author concludes that a qualitative assessment has not only diagnostic, but also theoretical benefits, since it allows us to correlate the difference between the “final” qualities that are the subject of professional and pedagogical discourse.
SECURE DATA STORAGE: METHODS AND APPROACHES
Release: 2025-1 (50)
DOI: 10.21777/2500-2112-2025-1-68-76
Keywords: secure data storage, information security, social engineering, configuration vulnerabilities, insider attacks, cryptographic protection, multilayer security, prototyping of security systems, methods for preventing data leaks
Annotation: The article describes the key aspects of the secure storage of organizational data in the modern world. The most common threats such as social engineering, configuration vulnerabilities, and insider attacks are discussed. The analysis of existing approaches to secure data storage in terms of software and hardware and their functional interaction in the information security system is carried out. Based on the results of the analysis, a prototype application was built using existing approaches and minimal risk of data leakage. Practical recommendations on choosing key ways to securely store data are presented. A methodology for projecting a secure environment based on a comprehensive review of technical, organizational and regulatory aspects is proposed. The novelty of the result obtained lies in the forming of a new multi-layered approach to data protection, including a single standard for the interaction of services. The practical significance of the results obtained lies in the possibility of direct application of the proposed methods within industrial systems, which will increase the level of security and reliability of confidential information processing.
ANALYSIS OF DNS SECURITY PROTOCOLS IN THE CONTEXT OF THE INDUSTRIAL INTERNET OF THINGS
Release: 2025-3 (52)
DOI: 10.21777/2500-2112-2025-3-70-82
Keywords: Industrial Internet of Things, DNS, IIoT security, cyberattacks, vulnerability of security protocols
Annotation: This study is aimed at a comprehensive review of the security problem of the Domain Name System (DNS) in the context of the Industrial Internet of Things (IIoT), where limited computing resources of devices are combined with high requirements for reliability and fault tolerance. A comparative analysis of specialized DNS protection protocols is presented, including DNSSEC, DoH, DoT, DoQ, as well as lightweight solutions such as DoC and mDNS, applicable under resource-limited conditions. The protocols were tested both in a virtualized environ- ment and on a microcontroller, enabling an assessment of their efficiency across different infrastructure levels. A scientific and methodological approach to the analysis of DNS protection protocols within the framework of the industrial Internet of Things is proposed, including the following procedures: the forming of a classification of cyberattacks on DNS in an industrial environment; the introduction of a semi-quantitative risk assessment model adapted to conditions of limited computing power; the comparison of traditional and lightweight protocols based on practical experiments. The investigation results can be applied to the selection of DNS security protocols in industrial systems, as well as in educational and methodological contexts.